diff --git a/src/runtime/virtcontainers/clh.go b/src/runtime/virtcontainers/clh.go index 9fbb221e45..29d60bc2f1 100644 --- a/src/runtime/virtcontainers/clh.go +++ b/src/runtime/virtcontainers/clh.go @@ -32,7 +32,7 @@ import ( "github.com/containerd/console" chclient "github.com/kata-containers/kata-containers/src/runtime/virtcontainers/pkg/cloud-hypervisor/client" - "github.com/opencontainers/selinux/go-selinux/label" + selinux "github.com/opencontainers/selinux/go-selinux" "github.com/pkg/errors" log "github.com/sirupsen/logrus" @@ -708,10 +708,10 @@ func (clh *cloudHypervisor) StartVM(ctx context.Context, timeout int) error { // notwant to run them under confinement. if !clh.config.DisableSeLinux { - if err := label.SetProcessLabel(clh.config.SELinuxProcessLabel); err != nil { + if err := selinux.SetExecLabel(clh.config.SELinuxProcessLabel); err != nil { return err } - defer label.SetProcessLabel("") + defer selinux.SetExecLabel("") } err = clh.setupVirtiofsDaemon(ctx) diff --git a/src/runtime/virtcontainers/fc.go b/src/runtime/virtcontainers/fc.go index 3442edadbc..d44efcb3a5 100644 --- a/src/runtime/virtcontainers/fc.go +++ b/src/runtime/virtcontainers/fc.go @@ -38,7 +38,7 @@ import ( "github.com/containerd/fifo" httptransport "github.com/go-openapi/runtime/client" "github.com/go-openapi/strfmt" - "github.com/opencontainers/selinux/go-selinux/label" + selinux "github.com/opencontainers/selinux/go-selinux" "github.com/pkg/errors" "github.com/sirupsen/logrus" ) @@ -788,10 +788,10 @@ func (fc *firecracker) StartVM(ctx context.Context, timeout int) error { // them under confinement. if !fc.config.DisableSeLinux { - if err := label.SetProcessLabel(fc.config.SELinuxProcessLabel); err != nil { + if err := selinux.SetExecLabel(fc.config.SELinuxProcessLabel); err != nil { return err } - defer label.SetProcessLabel("") + defer selinux.SetExecLabel("") } err = fc.fcInit(ctx, fcTimeout) diff --git a/src/runtime/virtcontainers/qemu.go b/src/runtime/virtcontainers/qemu.go index 282d1d1a95..d89f34c624 100644 --- a/src/runtime/virtcontainers/qemu.go +++ b/src/runtime/virtcontainers/qemu.go @@ -35,7 +35,7 @@ import ( "github.com/kata-containers/kata-containers/src/runtime/virtcontainers/pkg/rootless" govmmQemu "github.com/kata-containers/kata-containers/src/runtime/pkg/govmm/qemu" - "github.com/opencontainers/selinux/go-selinux/label" + selinux "github.com/opencontainers/selinux/go-selinux" "github.com/pkg/errors" "github.com/sirupsen/logrus" "golang.org/x/sys/unix" @@ -1210,10 +1210,10 @@ func (q *qemu) StartVM(ctx context.Context, timeout int) error { // the SELinux label. If these processes require privileged, we do // notwant to run them under confinement. if !q.config.DisableSeLinux { - if err := label.SetProcessLabel(q.config.SELinuxProcessLabel); err != nil { + if err := selinux.SetExecLabel(q.config.SELinuxProcessLabel); err != nil { return err } - defer label.SetProcessLabel("") + defer selinux.SetExecLabel("") } if q.config.SharedFS == config.VirtioFS || q.config.SharedFS == config.VirtioFSNydus { err = q.setupVirtiofsDaemon(ctx)